Quote:
Originally Posted by TadW
It's pretty easy to extract the content of cramfs.Fsk.img and cramfs.Rootfs.img (see attached files). Likewise, it would probably be easy to replace the images with our own images, meaning that this way we could also flash anything we want to the Reader. The checksum file would have to be adjusted, or, if we couldn't find out the checksum algorithm used, the flash executable would have to be patched to ignore wrong checksums.
|
Holy $DEITY.
What a find.
I wonder what would happen if we replaced file
/sony/ebook/FONT/tt0003m_.ttf
in cramfs.Fsk.img
with the one that supports non-english language. Like Russian, or Latin 2, or ...
I am pretty sure that Igorsk or other *senior hacker* here will find out very soon.
The other image seems to be a *complete* working Linux filesystem with man pages, editors, pagers, network tools, and even perl 5.6.1. Please notice file cksum - could it be the tool for creating checksums? ;-)
It looks like Sony has provided us with many things to play with.
Name of file /usr/sbin/arm_920t_le-initdconfig, for example, could tell us, exactly what processor the device is using.
I also wonder who will be the brave soul willing to risk bricking the Reader by applying the patched patch ;-)